Starting Radius Accounting; Establishing A Session With A Router If The Aaa Server Is Unreachable - Cisco Catalyst 3750-E Software Configuration Manual

Hide thumbs Also See for Catalyst 3750-E:
Table of Contents

Advertisement

Controlling Switch Access with RADIUS
Command
Step 3
aaa authorization exec radius
Step 4
end
Step 5
show running-config
Step 6
copy running-config startup-config
To disable authorization, use the no aaa authorization {network | exec} method1 global configuration
command.

Starting RADIUS Accounting

The AAA accounting feature tracks the services that users are accessing and the amount of network
resources that they are consuming. When AAA accounting is enabled, the switch reports user activity to
the RADIUS security server in the form of accounting records. Each accounting record contains
accounting attribute-value (AV) pairs and is stored on the security server. This data can then be analyzed
for network management, client billing, or auditing.
Beginning in privileged EXEC mode, follow these steps to enable RADIUS accounting for each Cisco
IOS privilege level and for network services:
Command
Step 1
configure terminal
Step 2
aaa accounting network start-stop
radius
Step 3
aaa accounting exec start-stop radius
Step 4
end
Step 5
show running-config
Step 6
copy running-config startup-config
To disable accounting, use the no aaa accounting {network | exec} {start-stop} method1... global
configuration command.

Establishing a Session with a Router if the AAA Server is Unreachable

The aaa accounting system guarantee-first command guarantees system accounting as the first record,
which is the default condition. In some situations, users may be prevented from starting a session on the
console or terminal connection until after the system reloads, which can take more than three minutes.
To establish a console or telnet session with the router if the AAA server is unreachable when the router
reloads, use the no aaa accounting system guarantee-first command.
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
9-34
Purpose
Configure the switch for user RADIUS authorization if the user has
privileged EXEC access.
The exec keyword might return user profile information (such as
autocommand information).
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Purpose
Enter global configuration mode.
Enable RADIUS accounting for all network-related service requests.
Enable RADIUS accounting to send a start-record accounting notice at
the beginning of a privileged EXEC process and a stop-record at the end.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Chapter 9
Configuring Switch-Based Authentication
OL-9775-08

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst3560-e

Table of Contents